| 2009 |
12 | | Nikhil Swamy,
Michael W. Hicks,
Gavin M. Bierman:
A theory of typed coercions and its applications.
ICFP 2009: 329-340 |
11 | | Brian J. Corcoran,
Nikhil Swamy,
Michael W. Hicks:
Cross-tier, label-based security enforcement for web applications.
SIGMOD Conference 2009: 269-282 |
| 2008 |
10 | | Karthikeyan Bhargavan,
Cédric Fournet,
Andrew D. Gordon,
Nikhil Swamy:
Verified implementations of the information card federated identity-management protocol.
ASIACCS 2008: 123-135 |
9 | | Nikhil Swamy,
Brian J. Corcoran,
Michael Hicks:
Fable: A Language for Enforcing User-defined Security Policies.
IEEE Symposium on Security and Privacy 2008: 369-383 |
8 | | Nikhil Swamy,
Michael Hicks:
Verified enforcement of stateful information release policies.
PLAS 2008: 21-32 |
7 | | Nikhil Swamy,
Michael Hicks:
Verified enforcement of stateful information release policies.
SIGPLAN Notices 43(12): 21-31 (2008) |
| 2007 |
6 | | Trevor Jim,
Nikhil Swamy,
Michael Hicks:
Defeating script injection attacks with browser-enforced embedded policies.
WWW 2007: 601-610 |
| 2006 |
5 | | Nikhil Swamy,
Michael Hicks,
Stephen Tse,
Steve Zdancewic:
Managing Policy Updates in Security-Typed Languages.
CSFW 2006: 202-216 |
4 | | Nikhil Swamy,
Michael W. Hicks,
Greg Morrisett,
Dan Grossman,
Trevor Jim:
Safe manual memory management in Cyclone.
Sci. Comput. Program. 62(2): 122-144 (2006) |
| 2005 |
3 | | James Rose,
Nikhil Swamy,
Michael Hicks:
Dynamic inference of polymorphic lock types.
Sci. Comput. Program. 58(3): 366-383 (2005) |
| 2004 |
2 | | Glenn Ammons,
Jong-Deok Choi,
Manish Gupta,
Nikhil Swamy:
Finding and Removing Performance Bottlenecks in Large Systems.
ECOOP 2004: 170-194 |
| 2003 |
1 | | Ken Hennacy,
Nikhil Swamy,
Don Perlis:
RGL Study in a Hybrid Real-time System.
Neural Networks and Computational Intelligence 2003: 203-208 |